Webserver scanning
General
/usr/share/seclists/Discovery/Web-Content/common.txt
/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
CGI
/usr/share/seclists/Discovery/Web-Content/CGIs.txt
SharePoint
/usr/share/wordlists/SecLists/Discovery/Web_Content/sharepoint.txt
gobuster dir -w /usr/share/seclists/Discovery/Web-Content/common.txt -s '200,204,301,302,307,403,500' -e -o gobuster -t 50 -u <host>
IIS
-x 'asp, aspx, html, txt'
Apache / nginx
-x 'php, cgi, jsp, html, txt'
wfuzz -w <wordlist-file> —-hc 404 <host>/FUZZ/FUZ2Z
wfuzz -c -w /usr/share/seclists/Discovery/Web-Content/common.txt --sh BBB <host>/file.php?param=FUZZ
Enumerate usernames
ffuf -w <wordlist-file> -X POST -d "email=FUZZ&password=x" -H "Content-Type: application/x-www-form-urlencoded" -u <url> -mr "email already exists"
Brute force passwords
ffuf -w emails.txt:W1,<password-file>:W2 -X POST -d "email=W1&password=W2" -H "Content-Type: application/x-www-form-urlencoded" -u <url> -fc 200
nikto -h <ip> -Format txt -o .
dotdotpwn -m http -h <ip> -f <file>
dotdotpwn -m http-url -u http://<ip>/nav.php?page=TRAVERSAL -o unix -s -d 4 -k "root:" -f /etc/passwd
DIRB is a Web Content Scanner. It looks for existing (and/or hidden) Web Objects. It basically works by launching a dictionary based attack against a web server and analyzing the response.
dirb <host> -o dirb
DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers.
dirbuster
You can use
wafw00f
to detect web application firewalls (WAFs).wafw00f <url>
Last modified 1yr ago